On Jul 31, 1:19 am, Jonathan Lundell <[email protected]> wrote:
>
> I'm suggesting (sticking with md5 for comparability):
>
>         md5(password+random)+random
>
> ...where random is randomly chosen for each new password.
>
> You're suggesting?

How can you hash a password with a "random" salt??, the whole purpose
for the authentication logic is to be able to recreate the hash in
order to compare against what is stored in the database?, under this
premise let's scrap the entire hashing issue and just set the
passwords to str(random.random())[2:]  or am I missing something here?

Thx,

Julio
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/web2py?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to